Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which statement is true about Cisco IOS ping indicators?

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?

69

Which factor determines TCP window size?

the amount of data the destination can process at one time

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

What is the loopback address for v4 and v6

127.0.0.1 v4 ::1 v6

What three addresses are valid public addresses? (Choose three.)

198.133.219.17 128.107.12.117 64.104.78.227

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

2001:db8:0:f000::/52

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 to 239.255.255.255

A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

3001

What is one advantage of network devices using open standard protocol

A client host and server running different operating systems can successfully exchange data

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

What is an example of network communication that uses client-server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Why is NAT not needed in IPv6?​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

What is true about the Server Message Block protocol

Clients establish a long term connection to servers.

What happens when the transport ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted .

Which three protocols operate at the application later of the TCP/IP model?

DHCP POP3 FTP

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

DNS

Which two characteristics are associated with UDP sessions? (Choose two.)

Destination devices receive traffic with minimal delay. Received data is unacknowledged.

By following a structured troubleshooting approach, a network administrator identified a network after a conversation with a user. What is the next step that the administrator should take?

Establish a theory of probable cause

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Exit privileged EXEC mode and press Enter.

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted World Wide Web, file transfer, and e-mail. Which protocols represent these three key applications?

FTP HTTP SMTP

What is a common protocol that is used with peer to peer applications such as WireShare, Bearshare, and Shareaza

Gnutella

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

Which method is used to send a ping message specifying the source address for the ping?

Issue the ping command without specifying a destination IP address.

What does a client do when it has UDP datagrams to send?

It just sends the datagrams.

Which three fields are used in a UDP segment header? (Choose three.)

Length Source Port Checksum

What is an example of a Trojan horse code.

Malware that was written to look like a video game

At which layer of the OSI model would a logical address be encapsulated?

Network Layer

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

Nothing can be determined for sure at this point.

Users are complaining that they are unable to browse certain websites on the internet.

Nslookup

Which applications or services allow hosts to act as client and server at the same time?

P2P applications

In what networking model would eDonkey, eMule, Bit Torrent, Bitcoin, and Lion Share be used?

Peer-to-peer

What is an advantage of SMB over FTP?

SMB clients can establish a long-term connection to the server.

Which two protocols may devices use in the application process that sends email?

SMTP DNS

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

SVI

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

Segments are sent from the transport layer to the internet layer.

Which term describes a field in the IPv4 packet header cloth at contains a 32-bit binary value associated with an interface on the sending device?

Source IPv4 address

What information does the loopback test provide?

The TCP/IP stack on the device is working correctly.

An employee complains that a Windows PC cannot connect to the internet. A network technician issues the ipconfig command on the PC and is show an IP address of 169.254.10.3. Which two conclusions can be drawn?

The cannot contact a DHCP server The pc is configured to obtain an IP address automatically.

Within a production network, what is the purpose of configuring a switch with a default gateway address?

The default gateway address is used to forward packets originating from the switch to remote networks.

Which three statements describe a DHCP Discover message? (Choose three.)

The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.

The global configuration command ip default gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

The switch can be remotely managed from a host on another network.

What property of ARP causes the NIC receiving ARP requests to pass the data portion of the Ethernet frame to the ARP process?

The type field 0x806 appears in the header of the Ethernet frame.

Which statement describes the treatment of ARP requests on the local link?

They are received and processed by every device on the local network.

How do hosts ensure that their packets are directed to the correct network destination?

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

Time Exceeded

What are two functions of NVRAM?

To store the configuration file To retain contents when power is removed

What are two roles of the transport later in data communication on a network? (Choose two.)

Tracking the individual communication between applications on the source and destination host Identifying the proper application for each communication stream

Which three statements characterize UDP? (Choose three.)

UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.

What is a characteristic of UDP?

UDP reassembles the received datagrams in the order they were received.

Which type of network traffic requires QoS

Video conferencing

What is the difference between a virus and a worm?

Worms self-replicate but viruses do not.

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet

Which OSI layer provides the interface between applications used to communicate and the underlying network over which messages are transmitted?

application

Which two types of applications are best suited for UDP? (Choose two.)

applications that handle reliability themselves applications that can tolerate some data loss, but require little or no delay

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

Which field in the TCP header indicates the status of the three-way handshake process?

control bits

What is a role of an IPS?

detecting and blocking of attacks in real time

What is one advantage that the IPv6 simplified header offers over IPv4

efficient packet handling

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall installing antivirus software

Which three commands are used to set up secure access to a router through a connection to the console interface?

line console 0 login password cisco

What IPv4 header field identifies the upper layer protocol carried in the packet?

protocol

What is a key characteristic of the peer-to-peer networking model?

resource sharing without a dedicated server

What are two services provided by the OSI network layer?

routing packets toward the destination encapsulating PDUs from the transport layer

Which name is assigned to the transport layer PDU?

segment

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

session layer application layer presentation layer

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices?

show cdp neighbors detail

Which command can an administrator execute to determine what interface a router will use to reach remote networks

show ip route

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?

show running-config

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

subnet mask

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?

terminal monitor

A technician uses the ping 127.0.0.1 command. What is the technician testing?

the TCP/IP stack on a network host

Which parameter does the router use to choose the path to the destination when there are multiple routes available?

the lower metric value that is associated with the destination network

What information about a Cisco router can be verified using the show version command

the value of the configuration register

What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the company is considering a network upgrade?

to document and analyze network traffic requirements on each network segment

What is the function of the HTTP GET message?

to request an HTML page from a web server

Which two fields are included in the TCP header but not the UDP header? (Choose two.)

window sequence number


Conjuntos de estudio relacionados

Eliopoulos Chapter 16- Sexuality and Intimacy

View Set

Market Research and Determining Available Sources

View Set

Типы текста: повествование, описание, рассуждение

View Set

Ch 9 - Controlling Microbial Growth in The Environment

View Set